First Third Station

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

First Station: Basic computer knowledge 5.

Microphone
Theme 1: Types of Equipment Input device that captures audio.
1. Desktop or desktop computer
A device that has separate parts, such as chassis, Output components
monitor, keyboard and a mouse. They are responsible for providing the user with data from
2. Notebook or laptop computer output (images, sounds, videos, text and
Portable equipment that can be used with a battery or others).
be plugged in. It is easy to handle and transport. 1. Monitor
3. Ultrabook Output external device that displays system information
An ultra-thin, lightweight laptop with great battery to the user.
autonomy that does not affect performance. 2. Printer
4. Tablet External device output whose function is to print text,
Portable mobile equipment operated mainly by a graphics and images. There are types of printers for every
touch screen. need, be it at home or for the company.
5. Smartphone 3. Speaker
A mobile phone that encompasses many of the key A box built around a speaker, which propagates the sound
technologies of communication and services (access and improves sound reproduction, either increasing or
to email, Internet and GPS) used in a computer or decreasing volume.
other devices.
Although different, the devices shown are all considered Processing components
computational systems. Within the processing components, data is processed and
information is generated that will be displayed on the
A computer system consists of a set of electronic output components.
components called ”hardware”, as well as programs or Processing units
applications (APPs), called ”software”. The main component is the CPU (central processing
unit) or processor.
Computational systems are composed of two parts: The CPU and other important computer components
hardware and software. fit onto the Motherboard, as shown in the figure on
The hardware is the physical piece. the side.
The software is the logical piece Functions of the Motherboard include performing the
instructions of a computer program, implementation
The hardware part is the physical part, everything that of basic arithmetic, logic, and input and output of
we can hold in our hands. It corresponds to the set of parts data, etc.
that make the computer run, like the mouse, the keyboard,
the printer and the monitor. Storage Components
The hardware can be divided into components for input, We need storage devices for information to be recorded.
output, processing and storage. A computer has devices that store information so that it is
not deleted when the computer is turned off. See the
Input components examples below:
These are used to enter data into a computer. DVD (digital versatile disc)
1. Keyboard A disk with the ability to record data in digital format. As
A device that has a series of buttons with letters, numbers it is newer than the CD, it also has much higher data
and symbols, used to enter data, information and storage capacity.
commands that are projected on computer screens, tablets
and smartphones. 1. Flash drive
2. Webcam A device composed of a flash memory, which can store
An input device that captures images and transfers them data for long periods of time without electrical power.
to a computer. These days, it’s commonly used for 2. Hard drive or hard disk (HD)
videoconferencing. A hardware component used to store data permanently,
3. Mouse and in great quantity. External hard drives are more
An external device that, along with the keyboard, allows practical because they can be loaded into backpacks and
data entry. Its function is to move the cursor around the briefcases.
monitor. 3. Online or cloud storage
4. Scanner The data is stored online, so that it can be accessed
An external device for scanning images, photos and text. anywhere, anytime and from different devices.
For example: Google Drive, DropBox, SkyDrive. software. You can create one or more partitions on it. It
Ports are used to connect the computer to external must be formatted to receive a file system.
devices. Look:
SystemPartitions
 Partitions can be defined as divisions of a hard drive,
i.e. technically speaking, logical or physical portions
of a hard drive.
 Partitions can store information.
 A disk must be partitioned to accommodate and
organize the data inside.
A tip for the use of partitions on a hard drive is to create
one partition for the Windows operating system, one for
the Linux operating system, and another for data only
(there can be more than one operating system on the same
a. PS/2 port computer).
Used to connect a mouse and a keyboard. Refer to the Therefore, if there is problem on a single partition, you
equipment manual to check the location of each only need to reinstall that partition and its programs, as
connection. the data on the other partitions are unaffected.
b. USB Port (universal serial bus)
Designed to be universally compatible with a wide variety Different types of printers.
of devices. 1. Dot matrix printer or impact printer
c. Parallel port Works with tape, prints with carbon and makes noise
Used to connect an external device, such as a printer. when printing.
d. Serial port 2. Inkjet printer
Remote control of equipment, such as routers, switches Works with ink cartridges to print text, spreadsheets,
and mouse. photos and graphics.
e. HDMI port 3. Laser printer
Used to connect the video monitor or multimedia Works with toner and consumes more electricity than
projector: HDMI and VGA. inkjet printers of the same size.
f. Game Port 4. Plotter
Used to connect joysticks. Used for large-scale and high quality prints, such as
g. Audio input and output banners.
Used to connect speakers and microphones. 5. Multifunction
h. Video Port Integrates printing, copying and scanning functions
Used to connect a video monitor or multimedia projector. into one machine.

Programs installed on your computer are called Software. An operating system is a set of programs that manages,
They can be divided into three groups: basic, utilities and or controls the use of all the resources of the computer.
applications. See the different types of software below. For example, it controls the processor, the memory, the
input and output devices, and program implementation.
Basic software is essential to run the computer.
 Microsoft Windows, Linux, iOS and Android are Now let’s learn more about some operating systems.
examples of operating systems. Later in this course, MacOS
we will have an entire lesson dedicated to the This is the operating system of Apple devices, like the
operating system. MacBook. It is proprietary software, meaning you need a
 Its main function is to ensure the proper functioning license to use it.
of the computer. Anti-virus software is an example of Linux
a utility that serves to protect your computer from It is an open source operating system, allowing people to
virus attacks and intruders. contribute to its ongoing development. It is a
 Applications are software programs that serve the free software, i.e. it may be used, copied, studied,
user, such as a text editor, a web browser or a modified and redistributed without restriction.
spreadsheet editor Windows
It is a widely used operating system, since it is compatible
Software is installed on storage devices. The most with most computers in the market. It is
common storage drive is the hard drive (HD). The HD proprietary software.
should be set up to receive the operating system and other
An operating system is a set of programs, (software) that There are different operating systems, and each has a
are used to manage system resources. Input and output primary feature.
components are processing elements, as well  Windows is a closed system, which requires a license,
as hardware. The computer system is formed but it is widely used in devices from different
by hardware and software working together. manufacturers.
 Linux’s open operating system encourages
Operating systems have a Control Panel, where the collaboration and does not require a license.
required configurations for the operating systems are set.
We will use Windows as an example in this course, so The mouse is a commonly-used device, separate to the
we'll show you how to use it. Here are some configurable computer, which serves to position the pointer on the
items. computer screen.

Windows is both a multi-tasking and a multi-user The computer keyboard is a commonly-used device,
operating system. separate from the computer, which allows data and
 This means it can be used by more than one user, and commands to be entered into the computer. It has keys
each user can perform multiple tasks simultaneously, representing letters, numbers, and symbols, along with
e.g. editing text and surfing the Internet. other functions.
 A multi-tasking system allows the processor to
perform multiple tasks at the same time. A multi-user Esc
system allows multiple users to access the computer This cancels the current operation.
at the same time. Softkey
Device Manager F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11 and F12.
 The Device Manager is a Control Panel item that These are keys that can be programmed for special
verifies the installed hardware. functions. Each program uses the function keys in a
 This item enables the installation and updating of different way.
device drivers on the hardware. Caps Lock
This is used to lock capital letters. When enabled, this key
Programs and Features causes the text to be typed in all caps. Check if the Caps
 This section of the Control Panel is used to uninstall Lock key light is illuminated on the keyboard.
or add/remove features of installed programs on the Depending on the keyboard, signaling that the key is
hardware. active varies, especially on notebooks.
Task Manager Shift
 The Task Manager monitors the computer's On its own, it does nothing. It is used in combination with
performance and manages the programs and services other keys. It is held down while another key is pressed.
running on the system. The most common function of the Shift key is switching
between uppercase and lowercase when editing text.
To take care of computer security, you need: Delete or Del
1. A firewall, which helps protect your computer by This deletes the character that is to the right of the text
preventing access by people or malicious programs. cursor. It is also used to delete files and objects selected
2. An anti-virus program, which helps to protect your on the screen.
computer against viruses and other security threats. Control or Ctrl
3. An antispyware program, which helps to protect your On its own, it does nothing. It is used in combination with
computer against spyware and other unwanted other keys. It is held down while another key is pressed.
programs. Windows
4. An operating system that is configured to You’ll find this on almost all current keyboards, and
automatically check for, and install, updates to your serves as a shortcut in Windows. When just this button is
computer. pressed, it activates the Windows Start Menu, and when
combined with other keys, you can open or perform some
The operating system manages system resources, such specific tasks.
as the use of RAM memory, CPU and file management. Alt
On its own, it does nothing. It is used in combination with
The user's appointments can be managed other keys. It is held down while another key is pressed.
by software, hardware upgrades refer to parts Alt Gr
replacement and threats to the system are counteracted by This accesses the third character of the key. In the absence
anti-malware software. of Alt Gr, you can use Ctrl+Alt.
Fn  .ppt - PowerPoint presentation file
This activates certain functions, which vary according to  .rar - compressed file
computer model.  .txt - text file
Backspace  .wav - audio file
This deletes the character that is to the left of the text  .xls or .xlsx - Excel spreadsheet file
cursor.
Enter
This confirms commands, and also creates new lines in Use File Manager to access folders and files. This is
the text editor. a Windows application that is also used to create
Num Lock or NumLk folders and subfolders.
This enables the numeric keypad. Check if the Num Lock
key light is illuminated on the keyboard. Third Station: All about the Internet
Welcome to the third station. Here, you can explore the
Second Station: Directories and files Internet.

Welcome to the second station. Here, you can explore  Computer networks
folders (directories) and files.  Internet
 Folders, files and programs  Internet browsing
 Editing of documents  ISPs and connection types
 Search
File” is the name given to a set of recorded information.  Email
 When we type text, for example, the text editing
program lets you save the information, transforming The Internet is the connection of many computer
it into a file that can be placed on any storage device, networks.
such as the hard drive. LAN – local area network
“Folder” is the name given to the place where files that  A local computer network that covers a relatively
can be stored on the hard drive, and flash drives, etc. are small area. Most LANs are confined to a single
stored. building or group of buildings.
 Other folders can also be saved within folders. WAN - Wide Area Network
Folders can also be called “directories”.  A wide area network that allows transmission of data
 We can therefore conclude that folders can be over greater geographical distances. A WAN is
compared to drawers, and files can be compared to slower than a LAN. An Internet connection is an
documents. example of a WAN.
 Both files and folders must have a name. Actually, a Domestic and corporate networks.
name and a "surname". Home Network
 A small LAN that normally has only one router to
A file consists of a name and an extension, separated by connect to the Internet.
a dot. Business Network
 The extension is like a "surname", which tells  A larger LAN that can have multiple routers to
Windows what to do when the file is executed. connect to different networks.
 For example, if the file is a document, the
extension will be associated with the program Protocols
that will be used to view or modify the document. In a network, computers communicate through protocols,
which are sets of predefined rules that describe how things
Examples of file extensions should be, the order in which they should happen, and
 .avi - video file what to do in case of errors.
 .bmp - image file  Just as a house has a street number (unique and non-
 .dll - library file transferable), on the Internet and in networks,
 .doc or .docx - Word text file IP (Internet Protocol) is the protocol used to give
 .exe - executable file computers an address.
 .gif - image file  A computer has a numerical address called “IP
 .jpg - image file address”.
 .mdb or .mdbx - Access Database file  An IP address consists of four numbers separated by
 .mp3 - audio file dots, each of which may vary from 0 to 255.
 .pdf - Electronic document file of Adobe Acrobat For example, 23.37.224.170.
Reader
 The IP address we just saw is actually a set of bits. computers, TVs and mobile devices, such as
tablets and smartphones.
Bit Corporate router
 It means binary digit, which is the smallest unit of  A more sophisticated, and therefore more
information that can be stored or transmitted. expensive, piece of equipment dedicated to
 The computer communicates through a binary forwarding packets and finding the best path
system, which will be explained further below. between networks (networks that are larger than
domestic networks), located both within and
A bit can only have two values, 0 or 1. outside of the company.
Switch
 1 byte = 8 bits  A piece of equipment that connects computers
 1 kilobyte (KB or Kbyte) = 1024 bytes within the same network.
 1 megabyte (MB or Mbytes) = 1024 kilobytes  In order to reduce costs and popularize the
 1 gigabyte (GB or Gbyte) = 1024 megabytes technology, home routers have a switch module
 1 terabyte (TB or Tbytes) = 1024 gigabytes built in.
 On the other hand, corporate models use
The amount of bytes defines the size of the data equipment dedicated to the function of the switch.
traveling on the network. Some terms used on the WWW (or Web)
 Typically, the information to be transmitted has
several bytes, and therefore must be divided into what
we call “packets”.
 On the Internet, the network breaks an email
message, for example, into parts that are called
“packets”. Each of these packets receives a source IP
address and a destination, and it is then sent over the
network.
 Each of these packages can be compared to a letter Hypertext
that has the both the recipient's and the sender’s - An electronic document that contains hyperlinks.
addresses, and it is sent by the Post Office, which is - Hypertext is organized to promote non-linear
responsible for transporting it to its destination. navigation, where the users create their own reading
 In networks, routers play the role of the Post Office, choices, unlike a book, where it's usually necessary to
and are responsible for forwarding packets through read the first chapter in order to understand chapter 2,
the network until they reach their destination. and so on.
Website
The router is a device used to connect different computer - Also known as a site, this is a set of web pages.
networks to each other, enabling the routing of packets. Homepage
 It directs which path the traffic of information - The homepage of a site.
should follow, which facilitates communication URL
between networks. - A web address. For example, http://www.cisco.com.
Hyperlink
- A hyperlink is a location in the hypertext, which the
user clicks to open another page. Typically,
hyperlinks are underlined.
Some of the most important services on the Internet are:
a. Browsing the World Wide Web – WWW
b. Email (or electronic mail)

Firewall Navigating the World Wide Web and email are called
 An application or piece of equipment, which is services
usually between the LAN and the WAN.
 It checks and filters the data stream, controlling
communications passing over the network, either
allowing or blocking them.
Home router
 It bridges the gap between a home network and
the Internet, and provides connectivity, usually to
Through these and other services, you can access:

To access these services, the user establishes a Coding examples


client-server type Internet connection, where the user's Encryption: A set of rules that put information into code
computer is the client and the services are installed on so that only the sender and the receiver are able to
servers. understand it.
That’s why you can access the services from
anywhere in the world. Morse Code: a binary representation of numbers, letters,
and graphical signals, which uses short and long sounds,
and dots and dashes to communicate messages. It was
developed in 1835 by the painter and inventor, Samuel
Finley Breese Morse.
You connect to the Internet through an ISP, which is
an Internet Service Provider.
Connection Types - Normally, you get that connection by paying a fee,
1. Dial-up connection – just like utility companies that provide water and
- Also known as dial-up connection. light.
- With this type of Internet access, a person uses a - The most common way to connect to an ISP is using
modem and a standard telephone line. a broadband connection.
2. DSL connection - Many ISPs offer services, such as email accounts,
- This type of access is provided through the exclusive content, personal website hosting, etc.
conventional telephone network, but it is different
from dial-up, since even if the user is logged on and Diagram of a home network with an Internet
surfing the Internet, the phone line will be released connection:
and may be used anytime for voice calls.
- This is a type of broadband connection, offering
speeds faster than dial-up.
3. Cable connection
- A cable connection uses the same infrastructure as Lan:
cable TV service, where both the TV service and the For example:
Internet data pass through the same connection at the Bluetooth
same time. WiFi
- This is also a type of broadband connection. ethernet cable
4. Other connection types Information on some types of LAN and WAN
Other ways to connect to the Internet: connections.
1. Satellite connection WiFi
2. Radio connection - The term, ”WiFi”, loosely translated, means wireless,
3. Connection via mobile phone (3G, 4G) or a connection to transmit information without the
use of wires or cables.
- In order to be transmitted through a physical medium, - WiFi is a wireless technology used to connect devices
information must be encrypted. on a local network.
- When we speak, our message is encoded into sound Bluetooth
waves by the sender, and decoded by the recipient's - This is the name given to a piece of wireless
ear. technology for wireless communication, which
- A computer encodes the information into electrical enables the transmission of data quickly and securely
signals that it puts on the cable network. via mobile devices, notebooks, keyboards, mice and
headphones.
- The range of Bluetooth is only a few meters.
Ethernet cable - A cable modem connects your computer to the ISP,
- Ethernet cables use twisted pairs of copper wires and and as a DSL network, cable offers high speeds and
connectors, similar to telephones. an always available service, which means that even
- They are commonly used for connecting networked when the connection is not in use, the Internet
computers in businesses. connection is still available.
Wan:
For example: To connect equipment to the Internet securely, install
optical fiber a firewall and pay attention to the event logs it generates.
DSL Additionally, you must install and maintain a good
cable anti-virus program!
3G and 4G
Satellite Electronic mail, or ”email”, is a service through which
people exchange messages over the Internet.
Satellite Internet - This can be done via the Web (Web mail), or by using
- This is used in places where conventional Internet is specific software called ”email clients”.
not available.
- Its area of coverage is global, since the satellites are
in space and have an extended reach.
Optical fiber
- An extremely thin fiber optic cable, comparable to the
thickness of a hair.
- Unlike twisted pair cable, optical fiber does not
conduct electricity, instead transmitting the data
through light. Optical fiber reaches great distances, POP and IMAP: Communication protocols that retrieve
even overseas. messages from an email server and pass them to an email
3G and 4G client.
- 3G technology is very common today with regard to SMTP: Communication protocol to send messages from
mobile phones and Internet. It is an acronym that the email client to the email server. It is also a
represents the third generation of mobile phone communication protocol between email servers.
standards and technology, replacing 2G. Structure of Email Address
- With this technology, voice transmission and data is 1. Switch
enhanced, offering greater connection speeds, among User Name
other features, such as broadcast television signals, This is the login name chosen by the user when
voice calls, three-dimensional games, and faster creating an email account.
downloading of music and videos, etc. For example, my username is Switch.
- 4G technology is represented by technologies that 2. at [@] (@)
provide Internet connections with very high speeds. This is the symbol that separates the user name from
Therefore, 4G mobile networks achieve speeds close the domain.
to those of cable or DSL modem connections. 3. Domain
- 4G allows access to multimedia content, such as HD This is the name registered by the company that offers
videos much faster, as well as video-conferencing and the email service.
music directly from the Internet, etc. For example, gmail.com.
DSL The mailbox, where emails are stored, consists of the
- An always-on service, which does not require you to following items:
dial each time you need to connect to the Internet. Inbox: stores messages that are received
- It uses existing copper phone lines to provide digital Outbox: stores messages that have not been sent
communication of high speed data between end users Sent Emails: stores messages that were sent
and telephone companies. Draft: stores messages that you have not finished
- Voice signals and data are transmitted on different writing
frequencies through copper telephone wires. Trash: stores deleted messages
Cable Netiquette is a set of manners that are part of general
- An Internet connection though cable that does not use agreements for full communication in virtual
phone lines. environments (emails, chats and forums), which means
- A cable connection uses coaxial cable lines, etiquette in the virtual network.
originally developed for transporting television
images via cable.
See what is not cool! - The virus depends on the execution of the host
 Avoid writing EXCLUSIVELY WITH CAPITAL program or file so it can become active and continue
LETTERS, and with exaggerated emphasis. Besides the infection process.
being extremely tiresome to read, it means that the
author is "screaming", which may offend the Check the table for some file extensions that may indicate
recipient. danger. In these cases, you should not click (run) the files
 Do not resend advertisements, chain letters, or other that are included as an attachment in a message.
similar messages.
 When asking a question, never be arrogant or rude.
 Do not avoid a subject, even when it is unpleasant. In
cases like this, the conversation should be completed
to show that the message was read.
 Where offense is caused, do not retaliate.
 Avoid abbreviations of words, e.g. “y”, “u”, “2”,
“lt8r”, etc.
 Avoid long messages, as this makes for tiring reading.
If a longer message is needed, leave a blank line
between some text phrases, dividing it into
paragraphs. This way, the text will be more organized
and easier to read.

See what’s cool, and what you should therefore always


do!
 Sources of papers used as references should be cited.
If you wish to make the full text available, please
indicate the website or the bibliography, in the case of
printed books and chapters.
 The text should always be clear and consistent.
 When replying to a message, put the recipient's name
at the beginning of the sentence.
 Attention to language rules is essential, so use
spellcheck. Reading text without punctuation,
particularly when it is long, is awkward, and more
importantly, the chances of it being misinterpreted are
increased.
 Try to express yourself clearly, and try to maintain the
context of the discussion.
 Give respect in order to be respected, and treat others
as you wish to be treated.

Spam - This refers to unsolicited emails, which are


usually sent to a large number of people.

Phishing - This is a form of electronic fraud,


characterized by attempts to acquire personal data of
various kinds, e.g. passwords, financial data, etc.
- The consists of a scammer impersonating a person or
trusted company by sending official electronic
communication. This occurs in several ways, mainly
by email, instant message, SMS, etc.

Virus - This is a program or part of a computer program,


usually malicious, that spreads by inserting copies of
itself, and becoming part of other programs and files.

You might also like